IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed   
Managing Security Reports
 
SSL Attacks on the Rise
sponsored by Radware
WHITE PAPER: As is always the trend, mass adoption of certain technologies is followed closely by efforts to exploit its wide use through a number of security threats. SSL is no exception to this rule. Download this white paper, to learn everything you need to know about SSL attacks and how to protect against them.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Radware

Vermont Electric Case Study
sponsored by Nozomi Networks
CASE STUDY: Watch this short video about Vermont Electric Cooperative Inc., as Chris Smith discusses the challenges of robust cybersecurity and how he overcame these challenges.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Nozomi Networks

Comprehensive Security for Your Applications
sponsored by VMware
WHITE PAPER: Despite cybersecurity being a top priority, organizations continue to fall short protecting against threats. In this white paper, learn how VMware can help your organization to architect security into your infrastructure to better secure your applications and data.
Posted: 17 Sep 2019 | Published: 31 Dec 2018

VMware

Enel Case Study: Securing Global Power Generation Network
sponsored by Nozomi Networks
CASE STUDY: Electric energy operators are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company. In this case study, learn how Enel was able to monitor, troubleshoot, and protect its industrial control network from a central location with the help of Nozomi Networks.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Nozomi Networks

The Hacker Powered Security Report 2019
sponsored by HackerOne
ANALYST REPORT: Security vulnerabilities are a fact of life. For this reason, organizations are competing to attract hackers who have 1 key advantage over traditional methods: they can think like an attacker. In this 2019 research report, learn about the state of hacker-powered security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

HackerOne

The Rise of Email Threats
sponsored by Barracuda
ANALYST REPORT: The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

State of the Web Report 2019
sponsored by Tala Security
ANALYST REPORT: The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Tala Security

Smart Branch Connectivity and Security Done Simply
sponsored by Verizon
RESOURCE: In this solution brief, discover how Verizon Software Defined Secure Branch can help you digitize your business with a secure, reliable and flexible network.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Verizon

Informatica Eliminates SSH Key Management with Aporeto Cloud PAM on AWS
sponsored by Aporeto
CASE STUDY: In this case study, dive into the benefits and solutions that Informatica received when utilizing Aporeto’s Cloud PAM to provide them with comprehensive visibility and better control over their sprawling environment.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

Aporeto

Considerations for Developing a Cyber Threat Intelligence Team
sponsored by Farsight Security
EGUIDE: In this e-guide, explore the best practices for team location and selection when developing a cyberthreat intelligence team.
Posted: 04 Sep 2019 | Published: 10 Oct 2017

Farsight Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement